Current Analysis Of Millentech Systems

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Much gratitude and appreciation are extended to the following people who without their support and encouragement the completion of this dissertation would not have been possible.

I oblige to thank Mr.Shazad Naqvi my dissertation supervisor, whose guidance and support has been an integral part in making this research possible. His encouragement and aid throughout the entire process of my survey and writing the report were an essential part of my success in the completion of this report.

CONTENTS

CHAPTER 1.............................................................................................4

Millentech Systems........................................................................4

Current Analysis of Millentech systems............................4

1.1Mission of Millentech ..................................................4

1.2 Millentech Department.................................................4

CHAPTER 2...............................................................................................5

Job Description....................................................................5

Purpose of Position........................................................5

Scope.............................................................................6

Responsibilities..............................................................6

CHAPTER 3................................................................................................7

Hardware Setup...................................................................7

3.1 PC Configuration......................................................7

3.2 Server Configuration................................................8

3.3 Switch......................................................................8

3.4 Firewall....................................................................8

3.5 Network...................................................................8

CHAPTER 4...............................................................................................13

Network Development........................................................13

4.1 Operating System....................................................22

4.2 ERP.........................................................................25

CHAPTER 5...............................................................................................27

Human Resource.................................................................27

5.1 IT professional assistant..........................................28

5.2 Network Administer ...............................................29

5.3 Web developer/Database administrator...................29

5.3 Data entry operator..................................................30

CHAPTER 6................................................................................................32

6.1 GANTT chart............................................................32

6.2 PERT chart................................................................33

CHAPTER 7.................................................................................................34

7 Conclusion................................................................34

REFERENCE...............................................................................................34

CHAPTER 1

1 Millentech Systems

1 Current Analysis of Millentech systems

"Millentech systems is an Egyptian company established Six years ago by two communication engineers under the Egyptian law of investment and specialized only in PACS and RIS solutions. The company has two branches, one main office in Cairo and one in Alexandria. They have more than 300 installations in Egypt, Syria, Qatar, Iraq, Turkey, Yemen, KSA, UAE, Jordan, Lebanon, Algeria, Libya, Iran, Nigeria, Pakistan, USA, Cote d' Ivoire Brazil and Slovenia. Millentech's PACS products are the first in the Middle East to be conforming to the 93/42/EEC European standards (CE mark). In their efforts to exist strongly in the international markets, they participate in the international events and exhibitions like RSNA Chicago, ECR Vienna, Medica Düsseldorf and Arab Health Dubai. Millentech is a leader in medical imaging and information solutions in Egypt and is spreading in

the Middle East and Europe. In Millentech they value both of customers and business partners. They are committed to provide complete high quality and cost effective medical imaging and information solutions to all of their customers ranging from small scale to mid and high scale.

1.1 Mission of Millentech:

• Introducing latest software and hardware technology in the medical field.

• Integrating software and hardware components to provide a complete solution.

• Building simple and efficient solutions that help people run their business more easily.

• Providing local products.

• Producing cost effective products.

1.2 Millentech Departments:

R&D Department: Is responsible for the development of Millentech software products and presenting the technical specifications of all the products [software and hardware].

Service Department: Handles all service and support issues including product assembly, testing, installation, application and after sale support.

Sales and marketing Department: Handles all sales issues inside Egypt including price offers,customer visits and customer technical awareness of Millentech products, products’ comparisons,contract negotiation and agreement.

Purchasing and Accounting Department: Is responsible for all purchasing and accounting issues.

International Marketing: Handles all marketing and sales issues outside Egypt including Millentech web site design, maintenance and all international offers.

Business Development Department: Is responsible for improving business prospects and adding value to the company via enhancing its competitive advantage by [1]

Millentech recently appointed an IT manager for the R&D department as the company was lacking technical capabilities which was affecting its overall performance .He has been given a time span and budget to establish an effective IS for the organization. A number of responsibilities were imposed on the IT manager which is elaborated in the next chapter."

CHAPTER 2

Job Description

"Designation: Information Technology Manager

2.1 PURPOSE OF THE POSITION

Responsible for installing and maintaining computer hardware, software and networks.

2.2 SCOPE

Report to the Senior Administrative Officer and manages and provides hardware and software maintenance, training and consultation, and recommendations about future planning and development of resources. Providing these services in an effective and efficient manner will ensure maximum access to and implementation of technology services and resources.

2.3 RESPONSIBILITIES

1. Manage information technology and computer systems:

Plan, organize, direct, control and evaluate the operations of information systems,operating system and enterprise resource system (ERP)

2. Develop and implement policies and procedures for data processing and computer systems operations and development

3. Meet with managers to discuss system requirements, specifications, costs and timelines.

4. Hire and manage information systems personnel and contractors to design, develop, implement, operate and administer computer and telecommunications software, networks and information systems

5.Control the computer systems budgets and expenditures

6.Ensure technology is accessible and equipped with current hardware and software

2.4 MAIN ACTIVITIES:

1. Troubleshoot hardware, software and network operating system

2. Be familiar with all hardware and software

3. Be familiar with network operating system

4. Provide orientation to new users of existing technology

5. Train staff about potential uses of existing technology

6. Train staff about new and potential use

7. Provide individual training and support on request

8. Provide recommendations about accessing information and support

9. Maintain current and accurate inventory of technology hardware, software and resources "by [2]

CHAPTER 3

3 Hardware Setup

An IS requires equipments through which it would communicate among the representatives of the company, suppliers, customers, and the management. It is therefore essential for IT managers to know the current status of the market regarding service, quality and commitment of the equipments provided by different suppliers. After a thorough research of the suppliers which provide the best service, quality, commitment, warranty and guarantee of equipments, after sales service, the IT professional assistant and the Network Administrator would decide to go with which potential supplier or hardware provider.

Network administrator will be responsible for the maintenance of computer hardware and software that comprises the computer network. This normally includes the deployment, configuration, maintenance and monitoring of active network equipment. A related role is that of the network specialist, or network analyst, who concentrates on network design and security.

The Network Administrator is usually the highest level of technical/network staff in an organization and will rarely be involved with direct user support. The Network Administrator will concentrate on the overall health of the network, server deployment, security, and ensuring that the network connectivity throughout a company's LAN/WAN infrastructure is on par with technical considerations at the network level of an organization's hierarchy. Network Administrators are considered Tier 3 support personnel that only work on break/fix issues that could not be resolved at the Tier1 (helpdesk) or Tier 2 (desktop/network technician) levels.

The IT manager plans to establish 10 computers in each department and a backup of 10 extra computers.This makes a total of 70 computers required by.He is also following the budget plan during his planning process.Each department is assigned 10 computers.The following hardware were required by the IT manager in order to setup the IS of the company:

3.1 PC configuration

1.Processor - Intel core 2 Duo 3.00 Ghz - 70 pcs

2.Mother Board - Intel - 70 pcs

3.Lan card, Sound card Built-in Mother board

4.Web cab - 70 pcs

5.RAM 1 GB DDR-2 - 70 pcs

6.HDD 200 GB - 70pcs

7.DVD writer - 70 pcs

8.Mouse - 70 pcs

9.Keboard - 70 pcs

10.Headphone - 70 pcs

3.2 Server configuration

Dell Poweredge 2850 or similar (RAID 1 or 5 with redundant PSU's, network cards, etc) -2 pcs (1 for backup)

3.3 Switch

16 port Cisco switch - 7 pcs

10 ports will be used by each department as there are 10 computers, the rest of the ports will be used when the business expands(planning a head)

3.4 Firewall

1. Cisco firewall - 1 pcs

2. Processor - Intel core 2 Duo 3.00 Ghz - 70 pcs

3. Mother Board - Intel - 70 pcs

4. Lan card, Sound card Built-in Mother board

5. Web cab - 70 pcs

6. Mouse - 70 pcs

7. Keboard - 70 pcs

8. RAM 1 GB DDR-2 - 70 pcs

9. HDD 200 GB - 70pcs

10. DVD writer - 70 pcs

11. Headphone - 70 pcs

3.5 Networking

Networking will be based on TCP/IP, because most of the software will run from web browser. We will use private IP network 172.16.1.1/24 so that it can use upto 254 node in the network server - 1. web server, ERP, database server , mail server- 2

Networking Hardware

Networking hardware includes all computers, peripherals, interface cards and other equipment needed to perform data-processing and communications within the network. CLICK on the terms below to learn more about those pieces of networking hardware.

 

This section provides information on the following components:

File Servers

Workstations

Network Interface Cards

Switches

Repeaters

Bridges

Routers

File Servers

A file server stands at the heart of most networks. It is a very fast computer with a large amount of RAM and storage space, along with a fast network interface card. The network operating system software resides on this computer, along with any software applications and data files that need to be shared.

The file server controls the communication of information between the nodes on a network. For example, it may be asked to send a word processor program to one workstation, receive a database file from another workstation, and store an e-mail message during the same time period. This requires a computer that can store a lot of information and share it very quickly. File servers should have at least the following characteristics:

800 megahertz or faster microprocessor (Pentium 3 or 4, G4 or G5)

A fast hard drive with at least 120 gigabytes of storage

A RAID (Redundant Array of Inexpensive Disks) to preserve data after a disk casualty

A tape back-up unit (i.e. DAT, JAZ, Zip, or CD-RW drive)

Numerous expansion slots

Fast network interface card

At least of 512 MB of RAM

Workstations

All of the user computers connected to a network are called workstations. A typical workstation is a computer that is configured with a network interface card, networking software, and the appropriate cables. Workstations do not necessarily need floppy disk drives because files can be saved on the file server. Almost any computer can serve as a network workstation.

Network Interface Cards

The network interface card (NIC) provides the physical connection between the network and the computer workstation. Most NICs are internal, and they are included in the purchase of most computers. Network interface cards are a major factor in determining the speed and performance of a network. It is a good idea to use the fastest network card available for the type of workstation you are using.

The most common network interface connections are Ethernet cards (LocalTalk connectors and Token Ring cards are seldom used in current networks).

Ethernet Cards

Ethernet cards are usually purchased separately from a computer, although many computers (such as the Macintosh) now include an option for a pre-installed Ethernet card. Ethernet cards contain connections for either coaxial or twisted pair cables (or both) (See fig. 1). If it is designed for coaxial cable, the connection will be BNC. If it is designed for twisted pair, it will have a RJ-45 connection. Some Ethernet cards also contain an AUI connector. This can be used to attach coaxial, twisted pair, or fiber optics cable to an Ethernet card. When this method is used there is always an external transceiver attached to the workstation.

Switches

A concentrator is a device that provides a central connection point for cables from workstations, servers, and peripherals. In a star topology, twisted-pair wire is run from each workstation to a central switch/hub. Most switches are active, that is they electrically amplify the signal as it moves from one device to another. Switches no longer broadcast network packets as hubs did in the past, they memorize addressing of computers and send the information to the correct location directly. Switches are:

Usually configured with 8, 12, or 24 RJ-45 ports

Often used in a star or tree topology

Sold with specialized software for port management

Also called hubs

Usually installed in a standardized metal rack that also may store netmodems, bridges, or routers

Repeaters

Since a signal loses strength as it passes along a cable, it is often necessary to boost the signal with a device called a repeater. The repeater electrically amplifies the signal it receives and rebroadcasts it. Repeaters can be separate devices or they can be incorporated into a concentrator. They are used when the total length of your network cable exceeds the standards set for the type of cable being used.

A good example of the use of repeaters would be in a local area network using a star topology with unshielded twisted-pair cabling. The length limit for unshielded twisted-pair cable is 100 meters. The most common configuration is for each workstation to be connected by twisted-pair cable to a multi-port active concentrator. The concentrator amplifies all the signals that pass through it allowing for the total length of cable on the network to exceed the 100 meter limit.

Bridges

A bridge is a device that allows you to segment a large network into two smaller, more efficient networks. If you are adding to an older wiring scheme and want the new network to be up-to-date, a bridge can connect the two.

A bridge monitors the information traffic on both sides of the network so that it can pass packets of information to the correct location. Most bridges can "listen" to the network and automatically figure out the address of each computer on both sides of the bridge. The bridge can inspect each message and, if necessary, broadcast it on the other side of the network.

The bridge manages the traffic to maintain optimum performance on both sides of the network. You might say that the bridge is like a traffic cop at a busy intersection during rush hour. It keeps information flowing on both sides of the network, but it does not allow unnecessary traffic through. Bridges can be used to connect different types of cabling, or physical topologies. They must, however, be used between networks with the same protocol.

Routers

A router translates information from one network to another; it is similar to a super intelligent bridge. Routers select the best path to route a message, based on the destination address and origin. The router can direct traffic to prevent head-on collisions, and is smart enough to know when to direct traffic along back roads and shortcuts.

While bridges know the addresses of all computers on each side of the network, routers know the addresses of computers, bridges, and other routers on the network. Routers can even "listen" to the entire network to determine which sections are busiest -- they can then redirect data around those sections until they clear up.

If you have a school LAN that you want to connect to the Internet, you will need to purchase a router. In this case, the router serves as the translator between the information on your LAN and the Internet. It also determines the best route to send the data over the Internet. Routers can:

Direct signal traffic efficiently

Route messages between any two protocols

Route messages between linear bus, star, and star-wired ring topologies

Route messages across fiber optic, coaxial, and twisted-pair cabling

CHAPTER 4

Networking Development

Network Operating System (NOS)

A network operating system (NOS) is a computer operating system that is designed primarily to support workstation, personal computer, and, in some instances, older terminal that are connected on a local area network (LAN). Artisoft's LANtastic, Banyan VINES, Novell's NetWare, and Microsoft's LAN Manager are examples of network operating systems. In addition, some multi-purpose operating systems, such as Windows NT and Digital's OpenVMS come with capabilities that enable them to be described as a network operating system.

A network operating system provides printer sharing, common file system and database sharing, application sharing, and the ability to manage a network name directory, security, and other housekeeping aspects of a network.

A network operating system implements protocol stacks as well as device drivers for networking hardware. Some network operating systems, like Windows 98 Second Edition, also add custom networking features like Internet Connection Sharing (ICS).

Network operating systems have existed for more than thirty years. The UNIX® operating system was designed from the beginning to support networking. In its early forms, Windows did not support networking, so Novell NetWare became the first popular network operating system for the personal computer (Windows 95 and Windows for Workgroups were Microsoft's first network operating system products). Today, nearly any consumer operating system qualifies as a network operating system due to the popularity of the Internet and the obvious need to support Internet Protocol (IP) networking at a minimum.

Unlike operating systems, such as Windows, that are designed for single users to control one computer, network operating systems (NOS) coordinate the activities of multiple computers across a network. The network operating system acts as a director to keep the network running smoothly.

Client/Server

Client/server network operating systems allow the network to centralize functions and applications in one or more dedicated file servers (See fig. 2). The file servers become the heart of the system, providing access to resources and providing security. Individual workstations (clients) have access to the resources available on the file servers. The network operating system provides the mechanism to integrate all the components of the network and allow multiple users to simultaneously share the same resources irrespective of physical location. Novell Netware and Windows 2000 Server are examples of client/server network operating systems.

Fig. 2. Client/server network

Advantages of a client/server network:

Centralized - Resources and data security are controlled through the server.

Scalability - Any or all elements can be replaced individually as needs increase.

Flexibility - New technology can be easily integrated into system.

Interoperability - All components (client/network/server) work together.

Accessibility - Server can be accessed remotely and across multiple platforms.

Disadvantages of a client/server network:

Expense - Requires initial investment in dedicated server.

Maintenance - Large networks will require a staff to ensure efficient operation.

Dependence - When server goes down, operations will cease across the network.

The First Step to Information Security

The terms Network Security and Information Security are often used interchangeably. Network Security is generally taken as providing protection at the boundaries of an organization by keeping out intruders (hackers). Information Security, however, explicitly focuses on protecting data resources from malware attack or simple mistakes by people within an organization by use of Data Loss Prevention (DLP) techniques. One of these techniques is to compartmentalize large networks with internal boundaries.

Network security concepts

Network security starts from authenticating the user, commonly with a username and a password. Since this requires just one thing besides the user name, i.e. the password which is something you 'know', this is sometimes termed one factor authentication. With two factor authentication something you 'have' is also used (e.g. a security token or 'dongle', an ATM card, or your mobile phone), or with three factor authentication something you 'are' is also used (e.g. a fingerprint or retinal scan).

Once authenticated, a firewall enforces access policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer worms or Trojans being transmitted over the network. Anti-virus software or an intrusion prevention system (IPS) help detect and inhibit the action of such malware. An anomaly-based intrusion detection system may also monitor the network and traffic for unexpected (i.e. suspicious) content or behavior and other anomalies to protect resources, e.g. from denial of service attacks or an employee accessing files at strange times. Individual events occurring on the network may be logged for audit purposes and for later high level analysis.

Communication between two hosts using the network could be encrypted to maintain privacy.

Honeypots, essentially decoy network-accessible resources, could be deployed in a network as surveillance and early-warning tools. Techniques used by the attackers that attempt to compromise these decoy resources are studied during and after an attack to keep an eye on new exploitation techniques. Such analysis could be used to further tighten security of the actual network being protected by the honeypot.

A useful summary of standard concepts and methods in network security is given by in the form of an extensible ontology of network security attacks.

Security management

Security Management for networks is different for all kinds of situations. A small home or an office would only require basic security while large businesses will require high maintenance and advanced software and hardware to prevent malicious attacks from hacking and spamming.

Database query language

A database query language and report writer allows users to interactively interrogate the database, analyze its data and update it according to the users privileges on data. It also controls the security of the database. Data security prevents unauthorized users from viewing or updating the database. Using passwords, users are allowed access to the entire database or subsets of it called subschemas. For example, an employee database can contain all the data about an individual employee, but one group of users may be authorized to view only payroll data, while others are allowed access to only work history and medical data.

If the DBMS provides a way to interactively enter and update the database, as well as interrogate it, this capability allows for managing personal databases. However, it may not leave an audit trail of actions or provide the kinds of controls necessary in a multi-user organization. These controls are only available when a set of application programs are customized for each data entry and updating function.

Transaction mechanism

A database transaction mechanism ideally guarantees ACID properties in order to ensure data integrity despite concurrent user accesses (concurrency control), and faults (fault tolerance). It also maintains the integrity of the data in the database. The DBMS can maintain the integrity of the database by not allowing more than one user to update the same record at the same time. The DBMS can help prevent duplicate records via unique index constraints; for example, no two customers with the same customer numbers (key fields) can be entered into the database. See ACID properties for more information (Redundancy avoidance).

Object-Relational Mapping (ORM)

Object-relational mapping (ORM) in computer software is a programming technique for converting data between incompatible type systems in relational databases and object-oriented programming languages. This creates, in effect, a "virtual object database" that can be used from within the programming language. There are both free and commercial packages available that perform object-relational mapping, although some programmers opt to create their own ORM tools.

Data management tasks in object-oriented (OO) programming are typically implemented by manipulating objects that are almost always non-scalar values. For example, consider an address book entry that represents a single person along with zero or more phone numbers and zero or more addresses. This could be modeled in an object-oriented implementation by a "person object" with "slots" to hold the data that comprise the entry: the person's name, a list of phone numbers, and a list of addresses. The list of phone numbers would itself contain "phone number objects" and so on. The address book entry is treated as a single value by the programming language (it can be referenced by a single variable, for instance). Various methods can be associated with the object, such as a method to return the preferred phone number, the home address, and so on.

However, many popular database products such as structured query language database management systems (SQL DBMS) can only store and manipulate scalar values such as integers and strings organized within normalized tables. The programmer must either convert the object values into groups of simpler values for storage in the database (and convert them back upon retrieval), or only use simple scalar values within the program. Object-relational mapping is used to implement the first approach.

The heart of the problem is translating those objects to forms that can be stored in the database for easy retrieval, while preserving the properties of the objects and their relationships; these objects are then said to be persistent.

Object-Oriented Programming (OOP)

Object-oriented programming (OOP) is a programming paradigm that uses "objects" – data structures consisting of data fields and methods together with their interactions – to design applications and computer programs. Programming techniques may include features such as data abstraction, encapsulation, modularity, polymorphism, and inheritance. It was not commonly used in mainstream software application development until the early 1990s. Many modern programming languages now support OOP.

Model-View-Controller Pattern

Model-View-Controller (MVC) is a classic design pattern often used by applications that need the ability to maintain multiple views of the same data. The MVC pattern hinges on a clean separation of objects into one of three categories — models for maintaining data, views for displaying all or a portion of the data, and controllers for handling events that affect the model or view(s).

Because of this separation, multiple views and controllers can interface with the same model. Even new types of views and controllers that never existed before can interface with a model without forcing a change in the model design.

How It Works

The MVC abstraction can be graphically represented as follows.

Events typically cause a controller to change a model, or view, or both. Whenever a controller changes a model’s data or properties, all dependent views are automatically updated. Similarly, whenever a controller changes a view, for example, by revealing areas that were previously hidden, the view gets data from the underlying model to refresh itself.

Implementation

Businesses have a wide scope of applications and processes throughout their functional units; producing ERP software systems that are typically complex and usually impose significant changes on staff work practices. Implementing ERP software is typically too complex for "in-house" skill, so it is desirable and highly advised to hire outside consultants who are professionally trained to implement these systems. This is typically the most cost effective way. There are three types of services that may be employed for - Consulting, Customization, Support. The length of time to implement an ERP system depends on the size of the business, the number of modules, the extent of customization, the scope of the change and the willingness of the customer to take ownership for the project. ERP systems are modular, so they don't all need be implemented at once. It can be divided into various stages, or phase-ins. The typical project is about 14 months and requires around 150 consultants. A small project (e.g., a company of less than 100 staff) can be planned and delivered within 3–9 months; however, a large, multi-site or multi-country implementation can take years. The length of the implementations is closely tied to the amount of customization desired.

To implement ERP systems, companies often seek the help of an ERP vendor or of third-party consulting companies. These firms typically provide three areas of professional services: consulting; customization; and support. The client organization can also employ independent program management, business analysis, change management, and UAT specialists to ensure their business requirements remain a priority during implementation.

Data migration is one of the most important activities in determining the success of an ERP implementation. Since many decisions must be made before migration, a significant amount of planning must occur. Unfortunately, data migration is the last activity before the production phase of an ERP implementation, and therefore receives minimal attention due to time constraints. The following are steps of a data migration strategy that can help with the success of an ERP implementation:

Identifying the data to be migrated

Determining the timing of data migration

Generating the data templates

Freezing the tools for data migration

Deciding on migration related setups

Deciding on data archiving

Process preparation

ERP vendors have designed their systems around standard business processes, based upon best business practices. Different vendor(s) have different types of processes but they are all of a standard, modular nature. Firms that want to implement ERP systems are consequently forced to adapt their organizations to standardized processes as opposed to adapting the ERP package to the existing processes. Neglecting to map current business processes prior to starting ERP implementation is a main reason for failure of ERP projects. It is therefore crucial that organizations perform a thorough business process analysis before selecting an ERP vendor and setting off on the implementation track. This analysis should map out all present operational processes, enabling selection of an ERP vendor whose standard modules are most closely aligned with the established organization. Redesign can then be implemented to achieve further process congruence. Research indicates that the risk of business process mismatch is decreased by:

linking each current organizational process to the organization's strategy;

analyzing the effectiveness of each process in light of its current related business capability;

understanding the automated solutions currently implemented.

ERP implementation is considerably more difficult (and politically charged) in organizations structured into nearly independent business units, each responsible for their own profit and loss, because they will each have different processes, business rules, data semantics, authorization hierarchies and decision centers. Solutions include requirements coordination negotiated by local change management professionals or, if this is not possible, federated implementation using loosely integrated instances (e.g. linked via Master Data Management) specifically configured and/or customized to meet local needs.

A disadvantage usually attributed to ERP is that business process redesign to fit the standardized ERP modules can lead to a loss of competitive advantage. While documented cases exist where this has indeed materialized, other cases show that following thorough process preparation ERP systems can actually increase sustainable competitive advantage.

Configuration

Configuring an ERP system is largely a matter of balancing the way you want the system to work with the way the system lets you work. Begin by deciding which modules to install, then adjust the system using configuration tables to achieve the best possible fit in working with your company’s processes.

Modules — Most systems are modular simply for the flexibility of implementing some functions but not others. Some common modules, such as finance and accounting are adopted by nearly all companies implementing enterprise systems; others however such as human resource management are not needed by some companies and therefore not adopted. A service company for example will not likely need a module for manufacturing. Other times companies will not adopt a module because they already have their own proprietary system they believe to be superior. Generally speaking the greater number of modules selected, the greater the integration benefits, but also the increase in costs, risks and changes involved.

Configuration Tables – A configuration table enables a company to tailor a particular aspect of the system to the way it chooses to do business. For example, an organization can select the type of inventory accounting – FIFO or LIFO – it will employ or whether it wants to recognize revenue by geographical unit, product line, or distribution channel.

So what happens when the options the system allows just aren't good enough? At this point a company has two choices, both of which are not ideal. It can re-write some of the enterprise system’s code, or it can continue to use an existing system and build interfaces between it and the new enterprise system. Both options will add time and cost to the implementation process. Additionally they can dilute the system’s integration benefits. The more customized the system becomes the less possible seamless communication between suppliers and customers.

Extensions

In this context, "Extensions" refers to ways that an ERP environment can be "extended" (supplemented) with third-party programs. It is technically easy to expose most ERP transactions to outside programs that do other things, e.g.:

archiving, reporting and republishing (these are easiest to achieve, because they mainly address static data);

performing transactional data captures, e.g. using scanners, tills or RFIDs (also relatively easy because they touch existing data);

Operating System

"Edubuntu built on the popular Ubuntu, is a complete operating system that includes an office suite, web browser, many educational applications, and much more. Edubuntu is committed to the principles of free and open source sofware which means it is free of charge and will always remain that way. Open Source software aims to preserve the freedom to use, copy, make changes and distribute those changes. This means Edubuntu can offer higher quality software at no cost, while allowing everyone to modify Edubuntu to fit the exact needs of their particular environment.

Edubuntu is comprised of several key technologies, one of which is the Linux Terminal Server Project (LTSP) which allows you to boot thin clients from an Edubuntu LTSP server. For educational environments, LTSP lowers hardware costs by enabling the use of older machines as thin clients, as well as reduced administration overhead by having only to install and maintain the software on the server. When a workstation fails, it can simply be replaced without data loss or reinstallation of the operating system.

Client-Server Compatible - Most computers are some mix of Microsoft Windows, Apple OS X and Linux. In this setting, you need an operating system that plays well with others. Edubuntu does that. Edubuntu servers can happily coexist on the same network as other operating systems, OpenOffice.org can open and save Microsoft Office formats, such as Powerpoint, Word and Excel documents and you can even install Edubuntu and another operating system on the same machine. Edubuntu share files between Edubuntu and other operating system or connect to a remote server

Network Security- Security has become a key challenge for educators and the team behind Edubuntu recognize this. Edubuntu, being a Linux-based operating system, enjoys the security advantages of its Unix-like and open source heritages. This translates into higher quality code and less spyware and viruses that plague other operating systems. In addition, Edubuntu has a strict, proactive security policy, meaning many common problems such as open ports or misconfigured software, are much less of an issue. Finally, Edubuntu is a true multiuser operating system, making it easy to allow users to complete their tasks without compromising the system.

Manageable - IT departments deploying and administering an increasingly large number of computers, time spent managing individual computers is scarce to non-existant. Edubuntu, by using LTSP thin client technology, makes deployment and management simple and easy. A single server is all that is needed to setup, manage and administrate an entire department of computers. Edubuntu is easy to customize for your unique needs, whether it be a simple rebranding or the addition or removal of programs. Hence Edubuntu can reduce the amount of time you spend administrating your computers.

Cost Effective - With ever increasing demands on budgets, it seems expensive technology is often last on the list. Edubuntu is and always will be free to acquire, use and modify. Need to setup another machine? Or another 100? Just install them! No more expensive OS upgrades and licenses, or only having specific programs on some computers. Edubuntu can also help save hardware costs, by allowing to redeploy older machines as thin clients using LTSP technology.

Well Supported - Edubuntu support is available from both the Edubuntu, and larger Ubuntu, communities. Many of the authors of the software included in Edubuntu can be contacted directly via mailing lists and IRC channels, including the Edubuntu developers themselves. There are many forms of support available, on mailing lists, wiki websites, IRC channels and bug trackers. There is also a special support group for using Edubuntu in businesses.

.

Applications

Here is a brief summary and some screenshots for the most popular Edubuntu packages, and if you need more, Edubuntu has thousands of additional applications ready for you to install.

Office Suite

OpenOffice.org is a complete office suite similar to the Microsoft Office suite. It features a word processor, as well as spreadsheet, presentation, drawing, database, and mathematical formula applications. OpenOffice.org can open and convert most Microsoft Office documents and has support for many different languages.

Web Browser

Firefox is the incredible successor to the hugely popular Mozilla browser. Amongst its many features are tabbed browsing, which makes viewing multiple sites a breeze, pop-up blocking, live bookmarks and great accessibility support.

Email, IM and VoIP

Moving beyond the simple web browser, Edubuntu also comes with an email client and personal information manager, Evolution. Video conferencing with Ekiga as well as instant messaging and chat with Gaim provide communications tools.

Graphics

In the graphics deparment, diagrams and flowcharts are a breeze with Dia. Xsane provides an easy to use scanner interface. 3D modeling and animation are Blender's specialty. Image editing similar to Adobe Photoshop is done using the GIMP. Scribus provides layout and publishing capabilites similar to Adobe Illustrator.

Hence IT manager chooses Edubuntu (Linux operation system) )instead of Microsoft windows as their operating system" by [3]

ERP

"The Web developer/database administrator chooses Openbravo’s professional web-based open source ERP solution which provides a unique mix of high-impact benefits:

Broad, streamlined functionality:

Rich Functional Footprint: Integrated Accounting, Sales & CRM, Procurement, Inventory, Production, and Project & Service Management

Integrated ecosystem of add-ons: Benefit from Openbravo and 3rd-party modules and industry verticals for a best fit implementation

Scale with Ease: Grow seamlessly from single-instance to multiple tenants, organizations, localizations, warehouses

Innovative:

True web-based open architecture

Easy to Use Web Application: Simple and secure browser access to all functionality, with web services for easy interoperability with other applications

Simple to Extend and Upgrade: Codeless & model-driven, allowing non-programmers to easily add new functionality adapted to unique needs

Flexible Deployment: On premise or on the cloud, single or multi-tenant, on Windows or Linux, there are options for every need

Cost-Effective

High value at predictable low cost

Minimal Upfront Investment: Subscription model allows "pay as you go" customer control, and avoids capital expense

Transparent Pricing: Easy to understand, no hidden fees, no haggling over price

Quick Start, High Return: Go live quickly with a standard, best-practices implementation, incrementally extend and grow the solution over time

The IT manager discovered that Millentech had oracle-based database so he changed to PostgresSQL which requires ORM to transfer previous data to generate new database.

PostgreSQL is an object-relational database system that has the features of traditional proprietary database systems with enhancements to be found in next-generation DBMS systems. PostgreSQL is free and the complete source code is available.

PostgreSQL development is performed by a team of mostly volunteer developers spread throughout the world and communicating via the Internet. It is a community project and is not controlled by any company.

 Installing Openbravo Dependencies

2.1 PostgreSQL

Install PostgreSQL:

apt-get install postgresql-8.3

Afterwards we have to set the PostgreSQL admin password:

sed -i 's/ident sameuser$/trust/' /etc/postgresql/8.3/main/pg_hba.conf

/etc/init.d/postgresql-8.3 restart

Open a PostgreSQL shell...

psql -U postgres

... and set the password:

alter role postgres with password 'yourrootsqlpassword';

\q

(Replace yourrootsqlpassword with a password of your choice.)

sed -i 's/trust$/md5/' /etc/postgresql/8.3/main/pg_hba.conf

/etc/init.d/postgresql-8.3 reload"

by [4,5]

CHAPTER 5

Human Resource

5.1 IT Professional Assistant

"DUTIES AND RESPONSIBILITIES

1.Diagnose and resolve issues related to personal computer hardware, operating system, application software, software utilities, data communications / connectivity devices, hand held devices, and other related peripherals.

2. Assist clients with operational and project based questions related to the integration or use of Information Technology devices or processes.

3. Assist clients with questions regarding their interaction with established organizational Information Technology interfaces, processes, practices.

4. Provide consultation and guidance to clients regarding the procurement of Information Technology goods and services to address local and organizational business needs.

5. Assist organization with standards development and best practices.

6. Researches emerging technologies and recommends hardware / software products that may help improve efficiency and effectiveness of technology for client

7. Create documentation and provide point-of-use training to client

8. Performs other related duties as assignedwork Administrator Specialist

Network Administrator Assistant

DUTIES AND RESPONSIBILITIES

1. Designs and/or implements network installations. This encompasses all aspects of network installation, including design, budget estimates, plans, inside/outside plant, post-install inspection, as-built drawings and test results.

2. Performs daily operations of managing network. This will include operation of networking components such as switches, routers, hubs, bridges, and transport media (wire, fiber optic cable, and/or wireless), as well as operation of configuration and management software tools.

3. Monitors network traffic, usage and performance making use of utilization and error statistics.

4. Maintains network stability by identifying trends, recommending and implementing corrective measures, and documenting action taken.

5. Serves as technical specialist in network problems and emergencies; assists in troubleshooting and resolution of network problems.

6. Analyzes and monitors network activity to ensure optimal network operation.

7. Controls network activity to ensure sound and secure operations.

8. Performs capacity planning with input from clients to ensure network services will keep pace with client needs.

9. Maintains schematics of existing and future network connectivity; maintains documentation for cable plant and the enterprise network.

10. Advises and trains clients regarding networking technology issues.

11. Additional duties as assigned.

5.3 Web Developer/Database Administrator

DUTIES AND RESPONSIBILITIES

1. Partner with clients to develop strategies and help translate their functional/business requirements into web-based solutions that support the unit's overall mission and vision.

2. Create, edit, manage and maintain web sites and/or applications that support unit initiatives.

3. Establish work flow and service agreements in order to analyze priorities and problems and evaluate their impact on services and time-lines.

4. Develop web standards and guidelines for style, content and code through

1) research of current web trends, 2) usability testing of clients, 3) surveys of clients and content managers, 4) administrative feedback and benchmarks, 5) university computer use policies and 6) relevant laws (e.g. 508 compliance and copyright).

5. Establish and maintain effective working relationships between IT and client communities; identify new and ongoing client needs.

6. Monitor and analyze web-related statistics; identify trends in the nature, frequency, and types of services requested, and use this data to continually improve content and quality of services.

7. Implement appropriate security measures to safeguard data and restrict access appropriately.

8. Audit web sites and applications to ensure that standards are met; security measures are in place and determine and address the impact of new requirements and programming changes required.

9. Design, develop and maintain web applications (e.g. data modeling, coding, integration, testing, debugging, maintenance, documentation code libraries and reporting.

10. Performs other duties as assigned.

Data Entry Operator

Duties and Responsibilities:

1.Provides technical direction or training to lower level operators;

2. Responsible for editing, processing (data entry) and distribution of raw source documents;

3. Consults with supervisor in providing needed information for keying process;

4. Adheres to strict batch processing schedule to meet deadlines;

5. Maintains program layout documentation of system programs

EDUCATION AND EXPERIENCE

High school diploma or equivalent and one (1) year of experience is preferred; A typing test may be required by some departments.

KNOWLEDGE, SKILLS AND ABILITIES

1. Knowledge of entry and coding procedures.

2. Skill in coding information into proper form for entry.

3. Ability to handle assignments to completion, which may require resolving problems, and correcting errors."

CHAPTER 6

6.1 Gantt Chart:

Tasks

Possible Start

Length

Type

Dependent on

1.Cabling

Week 1

3 days

Sequential

2.NOC Setup

Week 1

1 day

Parallel

1

3.PC set in all departments

Week 1

5 days

Sequential

2

4.Physical Networking

Week 1

1 day

Parallel

2

5.Software installation

Week 1

5 days

Parallel

4

6.Network Confiuration

Week 1

1 day

Sequential

4,5

7.Server Configuration

Week 2

4 days

Parallel

5

8.Testing all services

Week 2

1 week

Parallel

6,7

9.Training

Week 3

2 weeks

Parallel

7,8

Gantt Chart:

Pert Chart:

 

Chapter 7

Conclusion

The IT manager along with his human resource uses all his knowledge and experience to develope and effective and efficient information system for the company. This will help all the department to integrate among themselves is a stronger and better way. The resources that the IT manager uses are cost-effection which are mostly free, like edubuntu, openbravo which uses postgreSQL, at the same time these have a number of features that are compatible, easy to uses and usful. According to the gantt chart prepared by the IT manager ,any problems faced will be solved as soon as possible. The IT manager should be prepared for any external threats like pre-deadlines, PEST factors. If he is able to tackle these factors, Millentech has appointed a diamond.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now